Rise of Business Email Compromise: Key Trends and Tactics
Business Email Compromise (BEC) attacks have become an increasingly pressing concern for organizations globally. A recent investigation by LevelBlue’s SpiderLabs highlighted several significant trends in BEC tactics that every business should be aware of.
Dominant Lures in BEC Attacks
According to the findings, the “Request For Contact” lure was the most prevalent strategy utilized in BEC attacks over the past year, accounting for a substantial 43% of all reported incidents. This approach typically sets the stage for more sophisticated dual-channel attacks, where cybercriminals attempt to shift the conversation from email to other communication platforms, such as mobile messaging apps. This tactic not only confuses victims but also minimizes the chance of detection from traditional email security measures.
Ongoing Threats: Payroll Diversions and Document Scams
Another significant trend identified in the report is the persistence of “Payroll Diversion” schemes. These types of attacks still represent a substantial threat, making up 31% of all BEC scams. Conversely, “Request for Document” scams, which had gained attention in previous years, have seen a decline in prevalence, but they remain active, contributing 2% to the total.
In a startling revelation, BEC scams reportedly garnered losses exceeding $2 billion in 2024 alone. This figure underscores how cybercriminals are continuously evolving their tactics and increasing the effectiveness of their schemes.
The Role of AI in BEC Attacks
The infiltration of artificial intelligence into BEC attacks is another alarming trend noted in the report. AI-driven scams have “exploded” in sophistication, with large language model chatbots capable of producing a level of writing that appears convincingly human. These tools are enabling attackers to tailor their messages to appear more legitimate and urgent, making it increasingly challenging for recipients to discern real from fraudulent communications.
Lengthier and More Complex Messages
In a shift from the traditional approach of short, concise messages, BEC communications are becoming longer and more elaborate. Historically, BEC emails were characterized by brief content, usually comprising one to three sentences without links or attachments. However, the report indicates a notable increase in the length and complexity of these messages. Cybercriminals are devising strategies that involve crafting detailed emails designed to convey authenticity and urgency.
Best Practices for Protection Against BEC
To mitigate the risk of falling victim to BEC attacks, LevelBlue stresses the importance of proactive measures. Businesses are encouraged to implement comprehensive security training for employees, enforce strict financial process controls, and establish robust identity access management systems. These strategies are vital in creating layers of defense that can help organizations avoid becoming appealing targets for cybercriminals.
For more detailed insights and recommendations, you can access the full report from LevelBlue. It offers essential guidance for understanding and countering the evolving landscape of BEC threats.


